General
-
Target
bank details.r01
-
Size
782KB
-
Sample
221218-k9c6bseb7t
-
MD5
15b9b7f81450bd85dc714961b1c33714
-
SHA1
dc9e77a03f8d4a991607eafe9fbfbcccedde1064
-
SHA256
c0b1d89b0e4f6e079a7bb810f5cd970369f4a47e06a1e5cc8e094ab65c165131
-
SHA512
a0682bee545400583dab8274fecb4dbc7c896f14e79115be180993d77d3ecb50643e1e628800e2d6c96d5d6ec1f3f9d09007b145c0fb807649b96fdd160295b6
-
SSDEEP
24576:s8+SC9My7/e1li9kFBXLkmBiv9tAOnwLmHtowC:RiM6KbFBXA8WkCwLmHewC
Static task
static1
Behavioral task
behavioral1
Sample
bank details.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bank details.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
bank details.exe
-
Size
964KB
-
MD5
1fba134acff71993a5da615ea19d804f
-
SHA1
e4a2a00bfa2ba626fb73453175b584fa306b8594
-
SHA256
d68266d44d18118b13f34a9c7ac9fb28d607d7b34c1a3f60145bfc1147a40177
-
SHA512
2ac58a172a3ffaaa7b2e152deea62b62535e05ee42b0571ff9ffe901017a6bbd57e55d80bafb94cad58e9317ac2c1505b5eff9e76b8cede6b856779faf12d0fe
-
SSDEEP
24576:yNGTgVIYbal26fVsHSPEgHn2nyXvoOBreS4G3r5/oOi3bJhxVsWy:AGT6IzEgVTTH2nyf
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-